BT Group
100+ Jarvis Technology and Strategy Consulting Interview Questions and Answers
Q1. What is tenant and types? What will happen if we use same subnet in more than one bridge domain of single vrf?
Explanation of tenant and types, and the consequences of using the same subnet in multiple bridge domains of a single VRF.
A tenant is a logical entity that groups together a set of networking resources and policies.
Types of tenants include common tenant, application tenant, and infrastructure tenant.
Using the same subnet in multiple bridge domains of a single VRF can cause IP address conflicts and communication issues.
This is because each bridge domain is a separate broadcast...read more
Q2. What is vtep, vxlan, why and where vxlan is used in ACI?
VTEP is a virtual tunnel endpoint and VXLAN is a network overlay technology used for scaling out virtualized data centers.
VTEP is used to encapsulate and de-encapsulate VXLAN packets.
VXLAN is used to extend Layer 2 segments over a Layer 3 network.
VXLAN is used in ACI to provide a scalable and flexible network fabric for multi-tenant environments.
VXLAN allows for up to 16 million unique network segments.
VXLAN uses a 24-bit segment ID to identify the virtual network.
VXLAN packe...read more
Q3. Leaf and Spine architecture and why fabric mode is used in between these two?
Leaf and Spine architecture is used in data center networks for scalability and redundancy. Fabric mode is used for efficient communication between them.
Leaf and Spine architecture is a two-tier network design where leaf switches connect to spine switches.
Leaf switches are connected to servers and storage devices while spine switches connect to other switches.
This architecture provides high bandwidth, low latency, and redundancy.
Fabric mode is used to create a single logical ...read more
Q4. What is ACI and what are features of ACI?
ACI stands for Application Centric Infrastructure. It is a software-defined networking solution by Cisco.
ACI provides centralized automation and policy-driven application profiles.
It enables network administrators to manage the entire infrastructure as a single entity.
ACI supports multi-tenancy, security, and integration with third-party tools.
It uses a declarative model to define application requirements and automatically configures the network accordingly.
ACI includes a har...read more
Q5. What is VDC? How many vdc can be created in Chassis having one supervisor?
VDC is Virtual Device Context. One supervisor can create up to 4 VDCs.
VDC allows multiple virtual switches to be created on a single physical switch
Each VDC has its own set of interfaces, VLANs, routing tables, and management interfaces
VDCs provide better resource utilization and isolation between different network services
Q6. How do you find out whether a system is compromised or vulnerable?
To determine if a system is compromised or vulnerable, conduct regular vulnerability scans and penetration testing.
Perform regular vulnerability scans using tools like Nessus or OpenVAS
Conduct penetration testing to simulate attacks and identify vulnerabilities
Monitor system logs for suspicious activity
Stay up-to-date with security patches and updates
Use intrusion detection and prevention systems
Perform code reviews and security audits
Educate employees on security best practi...read more
Q7. Traffic forwarding from end point user of one EPG to another EPG of same leaf? protocols used in flow
Traffic forwarding between EPGs on the same leaf is achieved through VXLAN encapsulation and routing protocols.
VXLAN encapsulation is used to create a virtual overlay network that spans multiple physical leaf switches.
Routing protocols such as OSPF or BGP are used to exchange routing information between the leaf switches.
The end point user's traffic is encapsulated in a VXLAN packet and forwarded to the destination leaf switch, where it is decapsulated and forwarded to the de...read more
Q8. What is vpc? What is vpc domain, role of vpc, advantages?
VPC stands for Virtual Private Cloud. It is a virtual network that provides a secure and isolated environment within the public cloud.
VPC domain is a logical boundary within which resources are created and managed.
VPC allows multiple virtual machines to communicate with each other as if they were on the same physical network.
VPC provides high availability and fault tolerance by allowing multiple instances to be deployed across multiple availability zones.
VPC also allows for t...read more
Q9. What is bridge domain and VNI? Which protocol is it?
Bridge domain is a layer 2 construct that separates broadcast domains. VNI is a VXLAN Network Identifier used for overlay networking.
Bridge domain is used to isolate traffic within a specific VLAN or subnet.
VNI is a 24-bit identifier used to identify VXLAN segments in an overlay network.
Both bridge domain and VNI are layer 2 constructs used in network virtualization.
Bridge domain is not a protocol, but VNI is a protocol used in VXLAN.
Bridge domain and VNI are commonly used in...read more
Q10. How traffic will be connected to internet by using ACI?
ACI provides connectivity to the internet through external Layer 3 networks.
ACI uses external Layer 3 networks to connect traffic to the internet.
This is achieved through the use of Border Gateway Protocol (BGP) and External Routing Policies (ERPs).
ACI also supports the use of Network Address Translation (NAT) to translate internal IP addresses to external IP addresses.
ACI can be configured to use multiple external Layer 3 networks for redundancy and load balancing.
ACI also p...read more
Q11. What if IPG? Interface profile and interface policies?
IPG refers to Interface Profile Group which is used to group interface profiles. Interface policies define the behavior of interfaces.
IPG is used to group interface profiles together for easier management.
Interface policies define the behavior of interfaces such as QoS, security, and VLAN settings.
IPG can be used to apply interface policies to multiple interfaces at once.
For example, you can create an IPG for all access ports and apply an interface policy for VLAN settings to...read more
Q12. 3. What does CIA stand for in cyber security?
CIA stands for Confidentiality, Integrity, and Availability in cyber security.
Confidentiality refers to protecting sensitive information from unauthorized access.
Integrity ensures that data remains accurate, complete, and unaltered.
Availability ensures that systems and data are accessible and usable when needed.
These three principles form the foundation of a secure cyber environment.
Example: Encrypting data to maintain confidentiality, implementing access controls to ensure i...read more
Q13. Traffic flow from end point of one leaf to to another end point of leaf?
Traffic flow from one leaf endpoint to another leaf endpoint is achieved through spine switches.
Traffic flows from the endpoint of one leaf switch to the spine switch.
The spine switch then forwards the traffic to the endpoint of the other leaf switch.
This is achieved through the use of routing protocols such as OSPF or BGP.
The spine switches act as intermediaries between the leaf switches.
This architecture is known as a leaf-spine network topology.
Q14. Which domain is created to connect VMM domains?
The domain created to connect VMM domains is called the Logical Switch domain.
Logical Switch domain is created in System Center Virtual Machine Manager (VMM) to connect VMM domains.
It is used to provide connectivity between virtual machines and physical networks.
It allows for centralized management of virtual switches and network policies.
Logical Switch domain can be used to create virtual networks that span multiple hosts and clusters.
It supports network virtualization and c...read more
Q15. Why Isis is used in fabric, what is Fabric?
ISIS is used in fabric for routing and scalability purposes. Fabric is a network architecture that allows for high-speed, low-latency communication between devices.
ISIS is a link-state routing protocol that is commonly used in fabric networks.
Fabric is a network architecture that is designed to provide high-speed, low-latency communication between devices.
Fabric networks are typically used in data centers and other high-performance computing environments.
ISIS is used in fabri...read more
Q16. Name some standard tools used in assessing the security of a system.
Standard tools for assessing system security
Vulnerability scanners (e.g. Nessus, OpenVAS)
Penetration testing tools (e.g. Metasploit, Nmap)
Network analyzers (e.g. Wireshark, tcpdump)
Log analysis tools (e.g. Splunk, ELK Stack)
Firewall and intrusion detection systems (e.g. Snort, Suricata)
Q17. Difference between traditional Mac learning and conversation Mac learning?
Traditional Mac learning is static while conversation Mac learning is dynamic.
Traditional Mac learning involves manually configuring MAC addresses in the switch's MAC address table.
Conversation Mac learning involves the switch dynamically learning MAC addresses based on the source address of incoming frames.
Traditional Mac learning is more prone to errors and requires more manual intervention.
Conversation Mac learning is more efficient and reduces the risk of errors.
Conversat...read more
Q18. What is VRF? why it is used in ACI?
VRF stands for Virtual Routing and Forwarding. It is used in ACI to provide network segmentation and isolation.
VRF allows multiple virtual networks to coexist on a single physical infrastructure.
Each VRF has its own routing table, which provides network segmentation and isolation.
In ACI, VRF is used to create tenant networks and provide policy enforcement between them.
VRF can also be used to provide secure connectivity between different parts of an organization.
VRF is commonl...read more
Q19. Difference between deferred revenue and unearned income
Deferred revenue and unearned income are two terms used interchangeably to describe the same concept.
Deferred revenue and unearned income refer to money received by a company for goods or services that have not yet been delivered or rendered.
Both terms are used interchangeably, but deferred revenue is more commonly used in accounting while unearned income is more commonly used in taxation.
Deferred revenue is recorded as a liability on the balance sheet until the goods or serv...read more
Q20. What is OTV and why need to implement it
OTV stands for Overlay Transport Virtualization. It is used to extend Layer 2 connectivity between data centers.
OTV is a Cisco proprietary technology
It allows for the extension of VLANs across multiple data centers
It provides a layer of abstraction between the physical network and the logical network
It helps in reducing the complexity of managing multiple data centers
It provides a disaster recovery solution by allowing virtual machines to be migrated between data centers
Q21. What is AAEP, why it is used?
AAEP stands for Application Centric Infrastructure (ACI) Anywhere Endpoint Policy. It is used to enforce endpoint security policies.
AAEP is a policy that defines how endpoints should be treated in an ACI fabric.
It is used to enforce security policies for endpoints across different domains.
AAEP is used to ensure that endpoints are properly classified and that the correct policies are applied to them.
It is an important component of Cisco's ACI architecture.
Examples of policies ...read more
Q22. Can we connect spine - spine?
Yes, spine-spine connections are possible in a leaf-spine network architecture.
Spine-spine connections can be used to increase network capacity and redundancy.
However, it is important to ensure that the spine switches are properly configured to avoid loops.
Examples of spine-spine connections include MLAG and ECMP.
Spine-spine connections are commonly used in data center networks.
Q23. What is orphon port in nexus?
An orphan port in Nexus is a port that is not associated with any VLAN or interface.
Orphan ports are also known as unused ports.
These ports can be used for future expansion or can be disabled to save power.
Orphan ports can be identified using the 'show interface status' command.
They can also be configured as Layer 3 ports or assigned to a VLAN.
Orphan ports can cause security issues if left unsecured.
Q24. How to configure firewall from scratch and what will the first step thta we have to follow ?
To configure a firewall from scratch, the first step is to define the security policy.
Define the security policy based on the organization's requirements and compliance standards
Identify the network topology and determine the zones that need to be protected
Select the appropriate firewall hardware or software based on the requirements
Configure the firewall rules to allow or deny traffic based on the security policy
Test the firewall configuration to ensure it is working as inte...read more
Q25. If in future you need to move from your current location would you be ready to move.
Yes, I am open to relocating for future opportunities.
I am flexible and willing to move if it aligns with my career goals.
I understand the importance of being adaptable in the consulting industry.
I have previously relocated for educational or professional purposes.
I am excited about the prospect of exploring new locations and cultures.
I am prepared to make the necessary arrangements and adjustments for a smooth transition.
Q26. List any four important components of good customer service.
Four important components of good customer service are empathy, responsiveness, knowledge, and professionalism.
Empathy: Understanding and addressing the customer's needs and emotions.
Responsiveness: Promptly and effectively addressing customer inquiries and issues.
Knowledge: Having a deep understanding of the product or service being offered.
Professionalism: Maintaining a courteous and respectful attitude towards customers.
Q27. In Paloalto firewall if cluster failure occur then which log would tou have to check ?
Check the system logs for cluster failure in Paloalto firewall.
Check the system logs for any error messages related to cluster failure
Look for logs indicating cluster synchronization issues
Review logs for any hardware or software failures in the cluster
Q28. How many logs type we have in monitor tab in panorama?
There are four types of logs in the monitor tab in Panorama.
Traffic logs
Threat logs
URL logs
Data logs
Q29. What are bare metal servers?
Bare metal servers are physical servers without any virtualization layer or operating system installed.
Bare metal servers are also known as dedicated servers.
They are used for high-performance computing, data-intensive workloads, and applications that require direct access to hardware.
Bare metal servers can be customized to meet specific requirements.
Examples of bare metal server providers include IBM, Dell, and HP.
Q30. Design a system which is flowing lacs of records per day considering scalaibility, performance and cost effificency.
Design a scalable, high-performance, and cost-efficient system for processing large volumes of records daily.
Utilize distributed computing to handle high volume of records efficiently
Implement data partitioning to distribute workload evenly across multiple nodes
Use caching mechanisms to improve performance and reduce latency
Optimize data storage by choosing appropriate database technologies like NoSQL or columnar databases
Implement auto-scaling to dynamically adjust resources...read more
Q31. What is penetration testing?
Penetration testing is a simulated cyber attack on a computer system to identify vulnerabilities and assess security measures.
It involves attempting to exploit weaknesses in a system's defenses
The goal is to identify potential security risks and provide recommendations for improvement
Penetration testing can be done manually or with automated tools
Examples of penetration testing include network penetration testing, web application penetration testing, and social engineering te...read more
Q32. Difference between EBITDA and Operating Income
EBITDA is a measure of a company's profitability, while Operating Income is a measure of a company's earnings from its core operations.
EBITDA stands for Earnings Before Interest, Taxes, Depreciation, and Amortization
Operating Income is also known as Earnings Before Interest and Taxes (EBIT)
EBITDA is a more comprehensive measure of a company's financial performance
Operating Income only takes into account the company's core operations
EBITDA is often used to compare companies in...read more
Q33. a)Microservice Architecture and design b)Explain your project c)Target Sum in array d)Nth highest salary e)Java Fundamentals
The interview questions cover topics like Microservice Architecture, project explanation, array manipulation, Nth highest salary, and Java fundamentals.
Microservice Architecture involves breaking down a large application into smaller, independent services that communicate with each other.
Explain a project you worked on, highlighting the technologies used, challenges faced, and the outcome.
Target Sum in array involves finding two numbers in an array that add up to a specific t...read more
Q34. What is the difference between a firewall and a next generation firewall
A firewall filters traffic based on predetermined rules, while a next generation firewall includes additional features like intrusion prevention and application awareness.
Firewall filters traffic based on IP addresses and ports
Next generation firewall includes intrusion prevention, application awareness, and deep packet inspection
NGFW can identify and block advanced threats like malware and ransomware
NGFW can provide more granular control over applications and users
Q35. How would you go about dealing with a request to sub-let? Talk us through the steps you would take and what kinds of things you look out for
When dealing with a request to sub-let, a property manager should follow a systematic approach to ensure compliance and protect the interests of all parties involved.
Verify if sub-letting is allowed as per the lease agreement or local laws
Request necessary documentation from the tenant, such as a sub-letting application and a copy of the sub-tenant's identification
Conduct background checks on the sub-tenant to ensure their suitability
Review the proposed sub-letting terms and ...read more
Q36. What is difference between budget and forecast
Budget is a plan for future financial activities, while forecast is a prediction of future financial outcomes.
Budget is a detailed financial plan for a specific period, usually prepared annually.
Forecast is an estimate of future financial outcomes based on past data and trends.
Budget is more rigid and set in stone, while forecasts are updated regularly to reflect changing circumstances.
Budgets are used for planning and control, while forecasts are used for decision-making and...read more
Q37. What is c and what is routing
C is a programming language and routing is the process of selecting the best path for network traffic.
C is a high-level programming language used for system programming and developing applications.
Routing is the process of selecting the best path for network traffic to reach its destination.
Routing protocols like OSPF, BGP, and EIGRP are used to determine the best path for network traffic.
Routing tables are used to store information about network topology and available paths....read more
Q38. How do you forecast revenue
Revenue forecasting involves analyzing historical data, market trends, and future projections to estimate future revenue.
Analyze historical revenue data
Consider market trends and industry growth rates
Factor in changes in pricing, product offerings, and marketing strategies
Use statistical models and forecasting techniques
Collaborate with sales and marketing teams for input and insights
Q39. Role of APIC controllers?
APIC controllers are used to manage and automate network infrastructure.
APIC controllers provide a centralized point of control for network infrastructure.
They automate network provisioning, configuration, and policy management.
APIC controllers use APIs to communicate with network devices and orchestrate network functions.
They enable network administrators to easily manage and monitor network traffic and security.
Examples of APIC controllers include Cisco ACI and VMware NSX-T...read more
Q40. What are the parameters of chat
Chat parameters include message content, sender, receiver, timestamp, and chat history.
Message content: The actual text or media being sent in the chat
Sender: The person or entity sending the message
Receiver: The person or entity receiving the message
Timestamp: The date and time when the message was sent
Chat history: Previous messages exchanged between sender and receiver
Q41. why do we need 5ghz when we already had 2.4 GHz
5GHz offers faster speeds, less interference, and more channels compared to 2.4GHz.
5GHz provides faster data transfer speeds compared to 2.4GHz, making it ideal for high-bandwidth activities like streaming HD video or online gaming.
5GHz has less interference from other devices like microwaves and cordless phones that operate on the 2.4GHz frequency.
5GHz offers more available channels, reducing the likelihood of congestion and improving overall network performance.
Devices that...read more
Q42. Difference between accrual and provision
Accrual is recognition of revenue or expense before payment. Provision is an estimated expense or liability.
Accrual is recognized when revenue or expense is incurred, regardless of payment.
Provision is an estimated expense or liability that may or may not occur in the future.
Accrual is a part of the accounting process, while provision is a part of financial planning.
Examples of accrual include salaries payable and interest receivable, while examples of provision include bad d...read more
Q43. What is inside the session table ?
The session table typically stores information about active network connections and their associated details.
Contains information such as source and destination IP addresses
Stores port numbers being used in the connection
Tracks the protocol being used (e.g. TCP, UDP)
May include timestamps for when the connection was established and last active
Q44. What is HA3 belongs to and work?
HA3 belongs to HMAC (Hash-based Message Authentication Code) and is used for secure authentication and integrity verification.
HA3 stands for Hash-based Message Authentication Code 3
It is used in cryptographic hash functions for secure authentication and integrity verification
HA3 is commonly used in network security protocols such as TLS (Transport Layer Security) and IPsec (Internet Protocol Security)
Q45. What is importance of database when troubleshooting production issue
Database is crucial for troubleshooting production issues as it stores critical data and logs for analysis.
Database stores important data and logs that can help in identifying the root cause of production issues.
By querying the database, developers can track down specific transactions or events that may have caused the problem.
Database backups can be used to restore data in case of data corruption or loss during troubleshooting.
Monitoring database performance can also help in...read more
Q46. What is the primary reason to switch.
The primary reason to switch is to pursue new opportunities and challenges.
Seeking career growth and advancement
Exploring different industries or sectors
Wanting to learn new skills or technologies
Improving work-life balance
Relocating to a different city or country
Q47. How to improve quality of chat
To improve quality of chat, focus on clear communication, active listening, and timely responses.
Use clear and concise language
Avoid technical jargon
Listen actively to the customer's concerns
Respond in a timely manner
Provide accurate and helpful information
Be empathetic and understanding
Offer solutions or alternatives
Follow up to ensure customer satisfaction
Q48. What would be bthe first steps if a change fails
The first steps if a change fails are to identify the cause, assess the impact, and determine the appropriate corrective actions.
Identify the cause of the failure
Assess the impact of the failure on the system and users
Determine the appropriate corrective actions to prevent the failure from happening again
Communicate the failure and corrective actions to stakeholders
Implement the corrective actions and monitor the system for any further issues
Q49. What is the difference between start schema and snowflake schema
Star schema is a denormalized schema with a single fact table and multiple dimension tables, while snowflake schema is a normalized schema with multiple dimension tables normalized into sub-dimension tables.
Star schema has a single fact table surrounded by multiple dimension tables, while snowflake schema has dimension tables normalized into sub-dimension tables.
In star schema, dimensions are denormalized, while in snowflake schema, dimensions are normalized.
Star schema is ea...read more
Q50. What are the 2 factors to define change urgency
The 2 factors to define change urgency are impact and timeline.
Impact of the change on the organization or stakeholders
Timeline for implementing the change
Examples: a critical system failure or a regulatory compliance deadline
Q51. From Routing & Switching
What is the difference between routing and switching?
Routing is the process of finding the best path for data packets to travel from one network to another
Switching is the process of forwarding data packets between devices on the same network
Routing is done by routers, while switching is done by switches
Routing uses IP addresses to determine the best path, while switching uses MAC addresses
Routing is slower than switching, but is necessary for communication between different ...read more
Q52. What is Heart Beat link ?
Heart Beat link is a feature in network security that ensures continuous communication between devices.
Heart Beat link is a mechanism used to maintain a connection between two devices by sending periodic signals.
It helps in detecting if a device is still active and reachable on the network.
If the Heart Beat link fails, it can trigger alerts or actions to address the issue.
Example: In a VPN connection, Heart Beat link can be used to ensure the tunnel remains open and active.
Q53. What is RAN, VLAN, 4G,5G, incident management.
RAN stands for Radio Access Network, VLAN is Virtual Local Area Network, 4G and 5G are mobile network technologies, and incident management involves handling and resolving network issues.
RAN (Radio Access Network) is a part of a mobile telecommunication system that connects individual devices to other parts of a network through radio connections.
VLAN (Virtual Local Area Network) is a technology that allows multiple networks to coexist on the same physical infrastructure, prov...read more
Q54. Design a validator and write a running code within 30 mins
Design a validator and write a running code within 30 mins
Define the validation rules and criteria
Implement the validation logic using a programming language of choice
Test the validator with different input data to ensure accuracy
Q55. can you convert switch into router
Yes, a switch can be converted into a router by enabling routing features and configuring routing protocols.
Enable routing features on the switch
Configure routing protocols such as OSPF or EIGRP
Assign IP addresses to interfaces
Implement access control lists for security
Install a routing software image if necessary
Q56. What is the difference between router and switch
Routers connect multiple networks together, while switches connect devices within the same network.
Routers operate at the network layer (Layer 3) of the OSI model, while switches operate at the data link layer (Layer 2).
Routers use IP addresses to forward data between networks, while switches use MAC addresses to forward data within a network.
Routers determine the best path for data packets to reach their destination, while switches simply forward data to the appropriate devi...read more
Q57. What is risk, what is vlook up and index
Risk is the potential for loss or harm, VLOOKUP is a function in Excel to search for a value in a table, INDEX returns a value from a specific row and column in a range.
Risk refers to the uncertainty of outcomes that could result in negative consequences.
VLOOKUP is a function in Excel used to search for a value in the first column of a table and return a value in the same row from a specified column.
INDEX is a function in Excel used to return a value from a specific row and c...read more
Q58. Placement of words and resolution over the chat
Placement of words and resolution over chat is important for effective communication.
Use proper grammar and punctuation
Avoid using all caps or excessive emojis
Be clear and concise in your messages
Adjust resolution settings to ensure clear display of text
Use appropriate font size and style for readability
Q59. How to convince a customer to buy your product.
Q60. What is Application override ?
Application override is a feature in network security that allows certain applications to bypass security policies.
Application override allows specific applications to bypass firewall rules or other security measures.
It is typically used for critical applications that may be blocked by default security settings.
Administrators can configure application override rules to allow certain traffic to pass through the network without inspection.
This feature can be useful for ensuring...read more
Q61. How do you load data into bigquery using dataflow
Data can be loaded into BigQuery using Dataflow by creating a pipeline in Dataflow that reads data from a source and writes it to BigQuery.
Create a Dataflow pipeline using Apache Beam SDK
Read data from a source such as Cloud Storage or Pub/Sub
Transform the data as needed using Apache Beam transformations
Write the transformed data to BigQuery using BigQueryIO.write()
Q62. What is network
A network is a collection of computers, servers, mainframes, network devices, and other devices connected to one another for sharing data and resources.
Networks can be classified based on their size (LAN, WAN, MAN)
Networks can be wired or wireless
Networks can be private (intranet) or public (internet)
Networks use protocols like TCP/IP for communication
Q63. What is statefull means ?
Stateful means the system or device keeps track of the state of active connections and can differentiate between different connections.
Stateful devices maintain information about the state of active connections
They can differentiate between different connections based on various parameters
Stateful firewalls keep track of the state of network connections to make decisions on allowing or blocking traffic
Q64. What is risk in project management
Risk in project management refers to potential events or situations that could have a negative impact on the project's objectives.
Risk is inherent in all projects and can arise from various sources such as technical, financial, environmental, or human factors.
Identifying and assessing risks is crucial in project management to develop effective risk management strategies.
Examples of risks in project management include budget overruns, delays in project timeline, resource const...read more
Q65. How would you handle a customer ticket?
I would prioritize the ticket based on severity, communicate with the customer for more information, troubleshoot the issue, and provide timely updates.
Prioritize the ticket based on severity level
Communicate with the customer for more information
Troubleshoot the issue using relevant tools and resources
Provide timely updates to the customer on the progress
Q66. Do you know anything about upselling?
Q67. What is network ,Network topology
A network is a group of interconnected devices that communicate with each other. Network topology refers to the layout of these devices.
Network topology can be classified into different types such as bus, star, ring, mesh, and hybrid.
Bus topology connects all devices to a single cable, while star topology connects all devices to a central hub.
Ring topology connects devices in a circular loop, while mesh topology connects devices to each other in a network.
Hybrid topology is a...read more
Q68. What are the phase of a vpn
The phases of a VPN include initiation, negotiation, data transfer, and termination.
Initiation phase involves establishing a connection between the client and server.
Negotiation phase involves agreeing on encryption algorithms and keys.
Data transfer phase is when actual data is transmitted securely.
Termination phase involves closing the connection.
Examples: IKEv2 VPN protocol follows these phases.
Q69. What is the role of Ozone Layer?
The ozone layer is a protective layer in the Earth's stratosphere that absorbs most of the sun's harmful ultraviolet radiation.
Protects living organisms on Earth from harmful ultraviolet radiation
Prevents skin cancer, cataracts, and other health issues in humans
Helps maintain the Earth's temperature balance by absorbing and reflecting solar radiation
Damages to the ozone layer can lead to increased UV radiation reaching the Earth's surface
Q70. What are the modules you have worked
I have worked on modules such as user authentication, data processing, API integration, and UI development.
User authentication module - Implemented login, registration, and password reset functionalities.
Data processing module - Developed algorithms for data manipulation and analysis.
API integration module - Integrated third-party APIs for various functionalities.
UI development module - Designed and implemented user interfaces using HTML, CSS, and JavaScript.
Q71. What is BT?
BT is a multinational telecommunications company headquartered in London, UK.
BT stands for British Telecommunications.
It provides a range of services including broadband, mobile, and TV.
BT is one of the largest telecommunications companies in the world.
It was founded in 1969 and privatized in 1984.
BT operates in over 180 countries and employs over 100,000 people.
Q72. What is VPN, how it works
VPN stands for Virtual Private Network, it allows users to securely access a private network over a public network.
VPN encrypts data to ensure secure transmission over the internet
It masks the user's IP address to maintain anonymity
VPN creates a secure tunnel between the user's device and the private network
Common uses include remote access to company networks and bypassing geo-restrictions
Examples of VPN services include NordVPN, ExpressVPN, and CyberGhost
Q73. What is asp packet capture
ASP packet capture is a method of capturing and analyzing network traffic to identify potential security threats.
ASP stands for Application Service Provider.
Packet capture involves capturing data packets as they travel across a network.
ASP packet capture helps in monitoring network traffic for security purposes.
Tools like Wireshark can be used for ASP packet capture.
Q74. What is SVA and its role?
SVA stands for Service Level Agreement and it defines the level of service a customer can expect from a company.
SVA outlines the specific services provided by a company and the standards to which they will be delivered
It includes details such as response times, resolution times, and availability of support
For example, a company may have an SVA that guarantees a response to customer inquiries within 24 hours
Q75. What is project management
Project management is the practice of initiating, planning, executing, controlling, and closing the work of a team to achieve specific goals and meet specific success criteria.
Involves initiating, planning, executing, controlling, and closing a project
Focuses on achieving specific goals and meeting success criteria
Requires effective communication, organization, and leadership skills
Utilizes tools and techniques such as Gantt charts, project schedules, and risk management plan...read more
Q76. what is full form of LASER
Light Amplification by Stimulated Emission of Radiation
Stands for Light Amplification by Stimulated Emission of Radiation
Involves the emission of light through a process of stimulated emission
Used in various applications such as surgery, communication, and manufacturing
Q77. Diff between Union and Union All
Union combines and removes duplicates, Union All combines without removing duplicates.
Union combines result sets and removes duplicates
Union All combines result sets without removing duplicates
Union is slower than Union All as it involves removing duplicates
Union All is faster than Union as it does not remove duplicates
Q78. Bloc structure explanation with clean architecture
Bloc structure is a design pattern used in clean architecture to separate business logic from UI.
Bloc stands for Business Logic Component
It helps in separating UI components from business logic
Bloc communicates with the repository layer to fetch data
Bloc pattern is commonly used in Flutter for state management
Q79. What is scrum master role
The Scrum Master is responsible for ensuring the Scrum team follows the Scrum framework and facilitates the team's progress.
Facilitates Scrum events such as daily stand-ups, sprint planning, and retrospectives
Removes impediments and shields the team from external distractions
Coaches the team on Agile principles and practices
Ensures the team adheres to Scrum values and rules
Helps the team continuously improve and increase their productivity
Q80. what are kind of topologies?
Topologies refer to the arrangement of nodes in a network and how they communicate with each other.
Common topologies include bus, star, ring, mesh, and hybrid.
Bus topology uses a single cable to connect all devices.
Star topology has all devices connected to a central hub.
Ring topology connects devices in a circular manner.
Mesh topology has each device connected to every other device.
Hybrid topology combines two or more different topologies.
Q81. What is VPc in nexus device
VPC in Nexus device stands for Virtual Port Channel, which allows multiple physical links to be combined into a single logical link for increased bandwidth and redundancy.
VPC allows for active-active links between switches, improving network resiliency
It is commonly used in data centers to create a loop-free topology
VPC is a feature of Cisco Nexus switches
Q82. What is VDC in Nexus device
VDC stands for Virtual Device Context in Nexus device, allowing multiple virtual switches within a single physical switch.
VDC allows for logical separation of resources within a single physical switch
Each VDC has its own set of resources and configuration, operating independently
VDC helps in achieving better resource utilization and network segmentation
Q83. What is Computer Networks
Computer Networks are systems of interconnected computers that communicate with each other to share resources and information.
Computer networks allow for sharing of resources such as files, printers, and internet connections.
They enable communication between devices through protocols like TCP/IP.
Examples include LANs (Local Area Networks), WANs (Wide Area Networks), and the Internet.
Q84. what is resource levelling?
Resource levelling is the process of adjusting project schedules to prevent resource overallocation.
Resource levelling involves shifting tasks within a project timeline to ensure that resources are not overallocated.
It helps in optimizing resource utilization and preventing burnout among team members.
Resource levelling may involve delaying certain tasks or hiring additional resources to balance workloads.
It is a common practice in project management to ensure smooth project e...read more
Q85. How can I satisfy customers
Satisfy customers by providing excellent service and addressing their needs and concerns.
Listen actively to their feedback and take action to improve
Offer personalized solutions and go above and beyond to exceed expectations
Provide timely and efficient service
Maintain a positive and friendly attitude
Ensure quality products and services
Offer incentives and rewards for loyalty
Q86. What is OSI model?
The OSI model is a conceptual framework that standardizes the functions of a telecommunication or computing system into seven layers.
The OSI model stands for Open Systems Interconnection model.
It helps in understanding how data is transferred from one computer to another over a network.
The seven layers are: Physical, Data Link, Network, Transport, Session, Presentation, and Application.
Each layer has specific functions and communicates with the corresponding layer on the rece...read more
Q87. End to end IP Packet flow
End to end IP packet flow refers to the process of transmitting data packets from source to destination through various network layers.
IP packet is generated at the source device and encapsulated with source and destination IP addresses.
Packet is then forwarded to the default gateway or next hop router.
Router checks the routing table and forwards the packet to the next hop or destination network.
Packet reaches the destination network and is delivered to the destination device...read more
Q88. Difference between table and views
Tables store data in a structured format, while views are virtual tables that display data from one or more tables.
Tables store actual data, while views display data dynamically based on the underlying tables.
Tables can be modified directly, while views are read-only.
Views can combine data from multiple tables, while tables store data in a single structure.
Q89. Treatment of provision and journal entry
Provision is an estimated expense recorded in the financial statements, while journal entry is the actual entry made to record the provision.
Provision is made for anticipated expenses that have not yet been incurred but are likely to occur in the future.
Journal entry is the actual accounting entry made to record the provision in the financial statements.
Provision is usually based on estimates and requires judgment by management.
Journal entry debits the expense account and cre...read more
Q90. Types of project management approaches
There are various project management approaches including Agile, Waterfall, Scrum, Lean, and Kanban.
Agile: Iterative and flexible approach, focuses on delivering value to the customer.
Waterfall: Sequential approach with distinct phases, each phase must be completed before moving to the next.
Scrum: Framework for managing work with an emphasis on iterative and incremental progress.
Lean: Focuses on maximizing value while minimizing waste.
Kanban: Visual management method to track...read more
Q91. Difference between API and microservices
API is a set of rules and protocols for building and interacting with software applications, while microservices is an architectural style that structures an application as a collection of small, autonomous services.
API is a communication interface that allows different software systems to interact with each other.
Microservices is an architectural approach where an application is composed of small, independent services that communicate with each other over a network.
APIs can ...read more
Q92. Sets and their uses in Tableau
Sets in Tableau are custom fields that define a subset of data based on certain conditions.
Sets can be used to group related data together for analysis
Sets can be created based on dimensions or measures
Sets can be used in calculations, filters, and visualizations
Examples: creating a set of top customers, creating a set of high-value products
Q93. what is 3 point estimation
3 point estimation is a technique used in project management to estimate the most likely duration or cost of a project task.
Involves estimating the best case scenario, worst case scenario, and most likely scenario for a project task
Calculates the average of the three estimates to determine the final estimate
Helps in providing a more accurate and realistic estimate for project planning and scheduling
Q94. what is 3 cost estimation
Cost estimation is the process of predicting the expense of a project or operation.
Cost estimation involves analyzing various factors such as resources, labor, materials, and overhead costs.
Different methods can be used for cost estimation, such as bottom-up estimation, parametric estimation, and analogous estimation.
Accuracy of cost estimation is crucial for project budgeting and decision-making.
Examples of cost estimation tools include Microsoft Project, Oracle Primavera, a...read more
Q95. What is estimation
Estimation is the process of predicting or approximating the time, effort, or cost required to complete a task or project.
Estimation helps in planning and scheduling tasks.
It involves analyzing the requirements, breaking them down into smaller tasks, and assigning effort or time estimates to each task.
Estimation techniques can vary, such as expert judgment, historical data analysis, or using estimation tools.
Estimation is an iterative process and should be revisited and refin...read more
Q96. packet flow of ASA/FTD
Packet flow of ASA/FTD involves ingress, inspection, and egress stages.
Ingress stage: Packet enters the ASA/FTD device through an interface.
Inspection stage: Packet is inspected by access control policies, NAT rules, and VPN configurations.
Egress stage: Packet exits the ASA/FTD device through an interface towards its destination.
Example: Ingress - packet enters ASA/FTD through outside interface, Inspection - packet is checked against access control list, Egress - packet exits...read more
Q97. SSl handshake explaination
SSL handshake is a process where a client and server establish a secure connection by exchanging encryption keys and verifying identities.
Client sends a request to the server to initiate the handshake
Server responds with its digital certificate
Client verifies the certificate and generates a pre-master secret
Both parties exchange encrypted messages using the pre-master secret to establish a secure connection
Q98. Explain Vlan and its types
VLAN stands for Virtual Local Area Network. It is a network technology that allows for segmentation of a single physical network into multiple virtual networks.
VLANs help in improving network security by isolating traffic between different departments or groups.
There are two main types of VLANs: Port-based VLANs and Tag-based VLANs.
Port-based VLANs assign ports on a switch to different VLANs, while Tag-based VLANs use VLAN tags to identify different VLANs.
Example: In a compan...read more
Q99. What is an EWO?
An EWO is an Emergency Work Order, a request for immediate action to address a critical issue.
EWOs are typically used in urgent situations where immediate action is required to prevent further damage or downtime.
Examples of EWOs include network outages, security breaches, or critical hardware failures.
EWOs are prioritized over regular work orders due to their urgent nature.
Q100. Longest increasing subsequence
Find the longest increasing subsequence in an array of integers.
Use dynamic programming to keep track of the longest increasing subsequence ending at each index.
Iterate through the array and update the longest increasing subsequence for each index.
Return the maximum length of the longest increasing subsequence found.
Top HR Questions asked in Jarvis Technology and Strategy Consulting
Interview Process at Jarvis Technology and Strategy Consulting
Top Interview Questions from Similar Companies
Reviews
Interviews
Salaries
Users/Month